subject

The goal of this lab is to test strength of different passwords. 1. Create 6 users in your Linux system, then assign each user a password that meets the following complexity requirement respectively. You should list the passwords created for each user.
1. A simple dictionary word (all lowercase)
2. 4-character digits
3. A simple dictionary word (all lowercase) +digits
4. A simple dictionary word (all lowercase) + digits + symbols
5. A simple dictionary word (all lowercase) +digits
6. A simple dictionary word (w. a mix of lower and upper case) + digits + symbols
2. Export above users' hash into a file named xxx. hash (replace xxx with your MIDAS ID) and use John the Ripper to crack their passwords in wordlist mode (use rockyou. txt). 3. Keep your john the ripper cracking for at least 10 minutes. How many passwords has been successfully cracked?

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 21:00
When a rectangular region is defined using an appropriate style, which value matches the specified edge of the clipping region to the edge of the parent element?
Answers: 3
question
Computers and Technology, 22.06.2019 09:40
It is vital to research each of the services you plan to disable before implementing any change, especially on critical machines such as the: a. servers in the test environment. b. domain controller and other infrastructure servers. c. desktops that have previously been attacked. d. desktops used by upper-level management.
Answers: 2
question
Computers and Technology, 22.06.2019 10:40
"it security policy enforcement and monitoring" respond to the following: describe how monitoring worker activities can increase the security within organizations. describe the rationale that managers should use to determine the degree of monitoring that the organization should conduct. explain the extent to which you believe an organization has the right to monitor user actions and traffic. determine the actions organizations can take to mitigate the potential issues associated with monitoring user actions and traffic.
Answers: 3
question
Computers and Technology, 22.06.2019 22:10
Asequential circuit contains a register of four flip-flops. initially a binary number n (0000 ≤ n ≤ 1100) is stored in the flip-flops. after a single clock pulse is applied to the circuit, the register should contain n + 0011. in other words, the function of the sequential circuit is to add 3 to the contents of a 4-bit register. design and implement this circuit using j-k flip-flops.
Answers: 1
You know the right answer?
The goal of this lab is to test strength of different passwords. 1. Create 6 users in your Linux sy...
Questions
question
Chemistry, 27.06.2020 03:01
question
Mathematics, 27.06.2020 03:01
question
Biology, 27.06.2020 03:01
question
Chemistry, 27.06.2020 03:01
question
English, 27.06.2020 03:01
question
Spanish, 27.06.2020 03:01
question
Mathematics, 27.06.2020 03:01
Questions on the website: 13722367